NOMA scheme

10608862 ยท 2020-03-31

Assignee

Inventors

Cpc classification

International classification

Abstract

A method of transmission for increasing communication channel capacity comprising superposing a first signal on a portion of a second signal to form a combined signal, wherein the first signal comprises a repetition coded signal, and transmitting the combined signal. Also disclosed is a method of receiving a combined signal for increasing communication channel capacity comprising performing threshold detection on the combined signal wherein the combined signal comprises a first signal comprising a repetition coded signal superposed on a portion of a second signal and the threshold detection enables derivation of the second signal and the first signal prior to repetition coding.

Claims

1. A method of transmission for increasing communication channel capacity comprising: superposing a first signal on a portion of a second signal to form a combined signal, wherein: the first signal comprises a repetition coded signal; a plurality of subcarriers is used to transmit the second signal; a portion of the plurality of subcarriers is used to transmit the portion of the second signal, the portion of the plurality of subcarriers comprising multiple ones of the plurality of subcarriers; and superposing the first signal on the portion of the second signal comprises spreading the first signal over the portion of the plurality of subcarriers used to transmit the portion of the second signal; and transmitting the combined signal.

2. The method of claim 1 wherein the portion of the second signal comprises a portion of the symbol durations of the second signal.

3. The method of claim 1 wherein the first signal is amplitude scaled prior to superposing.

4. The method of claim 1 wherein the first signal is phase rotated prior to superposing.

5. The method of claim 3 wherein the amplitude scaling preserves the symbol energy and minimum Euclidian distance of the original symbol streams.

6. The method of claim 1 wherein the repetition code length defines the portion of the second signal that the first signal is superposed on.

7. The method of claim 6 wherein the portion comprises a number of symbols of the second signal.

8. The method of claim 1 wherein the second signal and the first signal are manipulated in the frequency domain.

9. The method of claim 1 wherein the second signal and the first signal are manipulated in the time domain.

10. The method of claim 1 wherein only a single symbol of the first signal is superposed on the portion of the second signal.

11. A non-transitory computer readable medium comprising computer readable instructions that when executed by a processor, cause the processor to perform the method according to claim 1.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

(1) Embodiments will now be described, by way of example only, and with reference to the drawings in which:

(2) FIG. 1 illustrates a NOMA downlink;

(3) FIG. 2 illustrates superposed signals according to an embodiment;

(4) FIG. 3 illustrates a constellation diagram of a second (16QAM) signal and a first (QPSK) signal according to an embodiment; and

(5) FIG. 4 illustrates a simulation of AWGN channels using the disclosed new scheme.

(6) In the figures, like elements are indicated by like reference numerals throughout.

DETAILED DESCRIPTION

(7) Overview

(8) In general, NOMA can be considered to be a channel overloading technique. That is to say that the data rate and/or the number of users is increased with respect to standard OFDMA transmission. The following disclosed new technique comprises a new transmission scheme to combine signals for transmission and a new receive scheme to derive the combined signals at a receiver.

(9) Turning to FIG. 2, a first signal 20, 22 comprising an MC-CDMA symbol is combined (superposed) with a plurality, or stream, of a second signal (OFDMA symbols) 21. Preferably the first signal comprises a single MC-CDMA symbol. As illustrated in FIG. 2, first signal 20, 22 is combined with a portion 21A, 21B of second signal 21. The portion (spread length of the first signal) may comprise a plurality (N) of subcarriers of the second signal, and hence the superposition of the first signal on the portion of second signal is in the frequency domain as would be understood. The spread length is considered to be the number of OFDMA subcarriers of the second signal that the first signal overlaps with. FIG. 2 shows a spread length of 4 and hence there are N/4 first signals (20 and 22 of which are two examples).

(10) The second signal may comprise QAM modulation such as 16, 32, 64QAM or higher. The first signal may comprise QPSK modulation.

(11) As would be understood, it can be assumed that the first row of the Hadamard matrix, i.e., the sequence (1, 1, 1, . . . , 1) is used for symbol spreading so that the spreading process comprises repetition coding. That is to say that a repetition coding length x results in an overlap of x subcarriers of the second signal 21. With a spread length of 4, and assuming that QPSK modulation is used for the first signal (MC-CDMA symbol), the data rate on the channel is increased by 0.5 bits per OFDMA subcarrier. This is because a QPSK symbol (20, 22) superposed (combined) with an OFDMA symbols carries 2 bits. Since, in FIG. 2, each symbol of the first signal is spread over 4 subcarriers of the second signal, the superposition increases the transmitted bit rate by 0.5 bits per subcarrier. If the spread length of each symbol of the first signal is increased to 8, the data rate increase is 0.25 bits per OFDMA subcarrier. In general, a smaller value (below 4) of the repetition code decreases performance, and a higher value (above 8) decreases data rate. The preferred repetition code length is 4 or 8.

(12) Amplitude scaling may be used to preserve the symbol energy and the minimum Euclidean distance of the original symbol stream:

(13) Denoting the OFDMA symbols by a.sub.n, 1nN where n is the subcarrier index, the MC-CDMA symbols by b.sub.m with 1mM and the WH (Walsh Hadamard) sequences used for frequency-domain signal spreading by W.sub.m=(w.sub.1,m, w.sub.m,2, . . . , w.sub.m,N) for m=1, 2, . . . , M, the transmitted second signal on carrier n can be written as:

(14) x n = a n + 1 N .Math. m = 1 M w m , n b m

(15) for n=1, 2, . . . , N. The components of the WH sequences are 1. The division by {square root over (N)} in this equation is to preserve the symbol energy during the spectral spreading process.

(16) As would be understood, WH sequences are rows of the Hadamard matrix given by:

(17) H 2 = [ + 1 + 1 + 1 - 1 ] and H 2 N = [ H N H N H N - H N ] .

(18) The matrix H.sub.4 is given by:

(19) H 4 = [ + 1 + 1 + 1 + 1 + 1 - 1 + 1 - 1 + 1 + 1 - 1 - 1 + 1 - 1 - 1 + 1 ]

(20) The first WH sequence is the first row of this matrix, which is: W.sub.1=[+1 +1 +1 +1]. Spreading of a symbol with this sequence corresponds to a repetition code of length 4.

(21) The transmission scheme as shown in FIG. 2 that superposes a first signal 20, 22, preferably a single signal comprising a short repetition code length, onto a portion of a second signal 21A, allows joint detection of the two signals at a receiver as will be explained.

(22) As would be understood, exhaustive-search implementation of a Maximum-Likelihood (ML) receiver is very complex to implement in relation to processing power and general resources required. At a corresponding receiver for the above transmission scheme, threshold detection is performed as illustrated in FIG. 3.

(23) In the following, 16QAM modulation is assumed for the second (preferably OFDMA) signal 21, and QPSK modulation with amplitude scaling and repetition code length 4, for the first signal 20, 22 that is superposed to the second signal.

(24) Consider a symbol block ak,k=1, 2, . . . (21) taking its values from the 16QAM signal constellation. Each one of these symbols is transmitted at one subcarrier (for k=1, 2, . . . , N, symbol a.sub.k is transmitted on the kth subcarrier).

(25) The set of N subcarriers of the second signal 21 is split into N/4 groups of 4 subcarriers each (e.g. 21A, 21B). Focusing on the first group (portion) 21A, the transmitted symbols (one per subcarrier of portion 21A) are denoted {a.sub.1, a.sub.2, a.sub.3, a.sub.4}. By adding the repetition-coded QPSK symbol (denoted b), the signals transmitted on these four carriers can be written as:
x.sub.1=a.sub.1+b/2
x.sub.2=a.sub.2+b/2
x.sub.3=a.sub.3+b/2
x.sub.4=a.sub.4+b/2

(26) As can be seen, each subcarrier of second signal portion 21A transmits a different (OFDMA) symbol of the second signal 21 but the same (QPSK) symbol of the first signal 20.

(27) As shown in FIG. 3, the signals transmitted on the N/4 groups of subcarriers form a 64QAM signal constellation whose minimum distance is 6 dB lower than the original 16QAM modulation used for OFDMA. The repetition code of length 4 fully recovers this loss, and the asymptotic BER performance with maximum-likelihood (ML) detection is the same as that of the 16QAM modulation before superposition as will be explained.

(28) The crosses (30) represent 16QAM modulation used for second signal (OFDMA) users. The minimum distance is .sub.0=2. The addition of a QPSK symbol (32A, 32B, 32C, 32D) to a 16-QAM symbol leads to a 64QAM constellation formed of all of the circular points of FIG. 3. It is clear that the minimum distance of this constellation is .sub.1=.sub.0/2=1. Reduction of a distance by a factor of 2 is a reduction of 6 dB as is known. However, with a repetition code of length 4, symbol decisions are made block by block, and the squared minimum distance in the code space is:
.sub.2.sup.2=.sub.1.sup.2+.sub.1.sup.2+.sub.1.sup.2+.sub.1.sup.2=4.sub.1.sup.2+.sub.0.sup.2

(29) This shows that the minimum distance is as in the original 16QAM (second) signal constellation. In other words, the repetition code recovers the 6 dB loss due to the superposition of QPSK symbols.

(30) Regarding transmit power, if the power of the 16QAM symbols (second signal) is 10 and the power of the QPSK symbols (first signal) is 2, the power of the x.sub.k symbols is 10.5, and this means that the cost of adding 0.5 bits to each 16QAM symbol is only:
10.Math.log.sub.10(10.5/10)=0.2 dB.

(31) Taking an ideal maximum-likelihood receiver, the received combined signal on subcarrier k is r.sub.k=x.sub.k+n.sub.k, where n.sub.k represents additive white Gaussian noise (AWGN). The received signal block (r.sub.1, r.sub.2, r.sub.3, r.sub.4) is used to jointly detect the block of 5 symbols (a.sub.1, a.sub.2, a.sub.3, a.sub.4, b), which represents (a4k3,a4k2,a4k1,a4k,bk), where k is the index of the transmitted symbols. The ML receiver minimizes the following metric:
Min{|r.sub.1a.sub.1b/2|.sup.2+|r.sub.2a.sub.2b/2|.sup.2+|r.sub.3a.sub.3b/2|.sup.2+|r.sub.4a.sub.4b/2|.sup.2}

(32) where the minimization is performed over all possible values of the symbol block (a.sub.1, a.sub.2, a.sub.3, a.sub.4, b) i.e. (a4k3,a4k2,a4k1,a4k,bk). Exhaustive search involves the computation of 4(M).sup.4 metrics and their comparisons, where M is the number of points of the QAM signal constellation (M=16 for 16QAM). As can be seen, the sum of four squares has to be calculated. This is too complex. The following simplified receiver is proposed which uses threshold detection scheme.

(33) The simplified receiver comprises a plurality of steps, the number of steps corresponding to the repetition code length of a first signal superposed on a portion of a second signal, the first and second signals being used in the creation of a received combined signal. Each step of the simplified receiver scheme comprises threshold detection of the (16QAM) symbol block of the portion of the second signal that is superposed by the symbol of the (QPSK) first signal (4 subcarriers as we have a repetition code length 4 in the first signal, denoted by (a.sub.1, a.sub.2, a.sub.3, a.sub.4) in the below) conditional on the 4 values of the (QPSK) symbol of the first signal (denoted by b in the below).

(34) Taking the example of a 16QAM second signal and a QPSK first signal comprising repetition code length 4 (the first signal is superposed onto a 4 subcarrier symbol block of the second signal):

(35) The solid lines (34) denote the thresholds (2.0, 0.0, +2.0) for a 16QAM constellation as would be understood.

(36) In FIG. 3 it is shown that for each superposed QPSK symbol, there may be 4 positions (32A, 32B, 32C, 32D) in the effective 64QAM constellation equivalent to shifting the 16QAM symbol by (1+j)/2, (1j)/2, (1j)/2 and (1+j)/2 as would be understood.

(37) In each step there are 4 different decisions made to determine the 4 subcarriers (symbols) of the first signal and the symbol of the second signal. The steps are labelled 1, 2, 3, 4. However, the steps may be performed in any order.

(38) Step 1:

(39) In this step, threshold detection conditional on b=1+j (32A) takes place. Received symbol block (r.sub.1, r.sub.2, r.sub.3, r.sub.4) is sent to a threshold detector. The thresholds for the 16QAM second signal are shifted upwards by 0.5 in both the horizontal and vertical directions (real and imaginary) due to the 0.5 amplitude scaling of the first (QPSK) signal.

(40) The thresholds for the second signal for this step become (1.5, +0.5, +2.5) as shown by 35 and 37 on FIG. 3. The resulting decisions from the threshold detection of this step are denoted (.sub.1.sup.1, .sub.2.sup.1, .sub.3.sup.1, .sub.4.sup.1), or (a4k31,a4k21,a4k11,a4k1).

(41) Step 2:

(42) In this step, threshold detection conditional on b=1j (32B) takes place. Received symbol block (r.sub.1, r.sub.2, r.sub.3, r.sub.4) is sent to a threshold detector. The thresholds for the 16QAM second signal are shifted upwards by 0.5 in the horizontal (real) direction and downwards by 0.5 in the vertical (imaginary) direction due to the 0.5 amplitude scaling of the first (QPSK) signal.

(43) The thresholds for the real parts (horizontal direction) of the second signal for this step become (1.5, +0.5, +2.5) as shown by 37 on FIG. 3. The thresholds for the imaginary parts (vertical direction) of the second signal are (2.5, 0.5, +1.5) as shown by 36 on FIG. 3. The resulting decisions from the threshold detection of this step are denoted (.sub.1.sup.2, .sub.2.sup.2, .sub.3.sup.2, .sub.4.sup.2).

(44) Step 3:

(45) In this step, threshold detection conditional on b=1j (32C) takes place. Received symbol block (r.sub.1, r.sub.2, r.sub.3, r.sub.4) is sent to a threshold detector. The thresholds for the 16QAM second signal are shifted downwards by 0.5 in both the horizontal and vertical (real and imaginary) directions due to the 0.5 amplitude scaling of the second (QPSK) signal.

(46) The thresholds for the second signal for this step become (2.5, 0.5, +1.5) as shown by 36 and 38 on FIG. 3. The resulting decisions from the threshold detection of this step are (a4k31,a4k21,a4k11,a4k1) denoted (.sub.1.sup.3, .sub.2.sup.3, .sub.3.sup.3, .sub.4.sup.3).

(47) Step 4:

(48) In this step, threshold detection conditional on b=1+j (32D) takes place. Received symbol block (r.sub.1, r.sub.2, r.sub.3, r.sub.4) is sent to a threshold detector. The thresholds for the 16QAM second signal are shifted downwards by 0.5 in the horizontal (real) direction and upwards by 0.5 in the vertical (imaginary) direction due to the 0.5 amplitude scaling of the first (QPSK) signal.

(49) The thresholds for the real parts of the second signal for this step become

(50) (2.5, 0.5, +1.5) as shown by 38 on FIG. 3. The thresholds for the imaginary parts of the second signal are (1.5, +0.5, +2.5) as shown by 35. The resulting decisions from the threshold detection of this step are denoted (.sub.1.sup.4, .sub.2.sup.4, .sub.3.sup.4, .sub.4.sup.4).

(51) Additionally, in each step above, an error signal is computed which is the difference between the threshold detector input and output corresponding to each of the decisions made in each step. Accordingly, an error signal block is derived (e.sub.1.sup.i, e.sub.2.sup.i, e.sub.3.sup.i, e.sub.4.sup.i) where i is the step index and e.sub.k.sup.i=r.sub.k.sub.k.sup.ib.sub.i where b.sub.i represents the QPSK symbol value corresponding to that step.

(52) Subsequent to each step being completed, and the corresponding error signal block being derived, the decision on the transmitted block is made by evaluating the metric {|e.sub.1.sup.i|.sup.2+|e.sub.2.sup.i|.sup.2+|e.sub.3.sup.i|.sup.2+|e.sub.4.sup.i|.sup.2} for i=1, 2, 3, 4 and selecting the i index, which minimizes this metric. When we know the i index, we have the first signal values, and the value of b as provided by the step in question.

(53) In alternative embodiments, with a repetition code of length 8, the number of 16QAM symbols per block would be 8, say (a.sub.1, a.sub.2, a.sub.3, a.sub.4,a.sub.5, a.sub.6, a.sub.7, a.sub.8) and the metric evaluated will be of the form {|e.sub.1.sup.i|.sup.2+|e.sub.2.sup.i|.sup.2+|e.sub.3.sup.i|.sup.2+|e.sub.4.sup.i|.sup.2+|e.sub.5.sup.i|.sup.2+|e.sub.6.sup.i|.sup.2+|e.sub.7.sup.i|.sup.2+|e.sub.8.sup.i|.sup.2}, where i=1, 2, 3, 4 is the step index in the detector as discussed above. If the repetition coded symbol is not a QPSK symbol, but let us say a 16QAM symbol, the i index would take 16 values instead of 4.

(54) Alternatively, or additionally to amplitude scaling, a rotation (phase) function may be applied to the second signal. This is another way of ensuring that the minimum Euclidian distance is retained. As would be understood, there is no energy change when phase rotation occurs.

(55) Turning to FIG. 4, a simulation of AWGN channels is shown. For 16QAM with superposed QPSK (see 40both with an ML receiver or the disclosed simplified receiver), the SNR degradation compared to interference free 16QAM (42) does not exceed 0.5 dB at BER values below 10.sup.4. Asymptotically, the degradation converges to 0.2 dB.

(56) FIGS. 2 to 4 are shown in the frequency domain. In an alternative, signal spreading (superposition) may take place in the time domain instead of the frequency domain. In this case, all user signals are single-carrier signals which reduces their peak-to-average power ratio (PAPR). This is because it is assumed that a single subcarrier is assigned to each OFDMA (second signal) user. If this is the case, then the signals of OFDMA users are single-carrier signals. Further, if the spreading of (the overloaded QPSK first signal) symbols is carried out in the time domain, this means that the spread symbol energy is located on a single subcarrier, and the signal of these users is also single-carrier.

(57) This property is particularly important when the NOMA scheme is used for the uplink. It is well known that single-carrier signals have a smaller peak-to-average power ratio (PAPR) than multi-carrier signals, and the transmit power amplifier in the user device can be used more efficiently in this case.

(58) An advantage of time domain spreading is that single carrier is affected less by relevant power amplifier non-linearities as would be understood.

(59) In the time domain, instead of spreading over, for example, 4 or 8 subcarriers of the second signal in the frequency domain, spreading is done over, for example, 4 or 8 symbol durations of the second signal in the time domain. In this instance, the above equations:
x.sub.1=a.sub.1+b/2
x.sub.2=a.sub.2+b/2
x.sub.3=a.sub.3+b/2
x.sub.4=a.sub.4+b/2

(60) represent the signals transmitted at 4 consecutive symbol periods on a given subcarrier of the second signal instead of signals transmitted on 4 different subcarriers at a given symbol period of the second signal. The rest of the new technique operates in the same manner as above as described in relation to the frequency domain.

(61) As has been shown, only one symbol (MC-CDMA) of the first signal need be superposed to a portion of the symbols (OFDMA) of the second signal. This allows a simplified receiver to achieve maximum likelihood performance using threshold detection with a relatively small number of computations and comparisons. This further provides reduced sensitivity to frequency selective fading.

(62) Conversely, the previous scheme of superposing a plurality of MC-CDMA signals that are spread over the entire band onto OFDMA signals such that each MC-CDMA signal interferes with all OFDMA signals. This results in sensitivity to frequency selective fading. This also requires a relatively large number of MC-CDMA symbols to be superposed to achieve a significant channel overload performance (capacity increase). Further, with such a scheme, the use of a maximum-likelihood receiver is very resource heavy which results in iterative cancellation receivers being used instead. These receivers are suboptimum because iterative receivers based on interference cancellations will always leave some interference even after all iterations are complete.

(63) The various methods described above may be implemented by a computer program product. The computer program product may include computer code arranged to instruct a computer or processor to perform the functions of one or more of the various methods described above. The computer program and/or the code for performing such methods may be provided to an apparatus, such as a computer or a processor, on a computer readable medium or computer program product. The computer readable medium may be transitory or non-transitory. The computer readable medium could be, for example, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, or a propagation medium for data transmission, for example for downloading the code over the Internet. Alternatively, the computer readable medium could take the form of a physical computer readable medium such as semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disc, and an optical disk, such as a CD-ROM, CD-R/W or DVD.

(64) An apparatus such as a computer or processor may be configured in accordance with such code to perform one or more processes in accordance with the various methods discussed herein. Such an apparatus may take the form of a data processing system. Such a data processing system may be a distributed system. For example, such a data processing system may be distributed across a network.